Chapter 1: The Need for Cybersecurity

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Breaking Trust On The Internet
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Prepared by: Nahed Al-Salah
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Unethical use of Computers and Networks
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
7 Information Security.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Cyber Security Nevada Businesses Overview June, 2014.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Computer Security By Duncan Hall.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Security Mindset Lesson Introduction Why is cyber security important?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Safe Computing Practices. What is behind a cyber attack? 1.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Technical Implementation: Security Risks
Protecting Your Assets By Preventing Identity Theft
Securing Information Systems
Digital Security Identity theft Copyright Laws Plagiarism, and More.
3.6 Fundamentals of cyber security
E&O Risk Management: Meeting the Challenge of Change
Digital Citizenship Middle School
Threats By Dr. Shadi Masadeh.
A Project on CYBER SECURITY
How to Protect Yourself from ID Theft and Social Engineering
Chapter 11 crime and security in the networked economy
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
The Best Way To Secure U R Self
Teaching Computing to GCSE
Five Unethical Uses of Computers
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Data Security Team 1.
Cyber Security in the Mortgage Industry
BCT 2.00 Analyze Technology Issues
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Information Systems for Health:
Protecting Your Company’s Most Valuable Asset
Chapter 5: Will Your Future Be in Cybersecurity?
Protecting Yourself from Fraud including Identity Theft
Chapter 1: Information Security Fundamentals
LO1 - Know about aspects of cyber security
Protecting Yourself from Fraud including Identity Theft
Privacy, Security, and Ethics
Presentation transcript:

Chapter 1: The Need for Cybersecurity Instructor Materials Introduction to Cybersecurity v2.1 Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 1: The Need for Cybersecurity

Chapter 1: The Need for Cybersecurity Introduction to Cybersecurity v2.1 Planning Guide Cisco Networking Academy Program Introduction to Cybersecurity v2.1 Chapter 1: The Need for Cybersecurity

Chapter 1 - Sections & Objectives 1.1 Personal Data Explain the characteristics and value of personal data. Define personal data. Explain why personal data is profitable to hackers. 1.2 Organization Data Explain the characteristics and value of data within an organization. Describe types of data used by governments and organizations. Describe the impact of a security breach. 1.3 Attackers and Cybersecurity Professionals Explain the characteristics and motives of cyber attackers and the legal and ethical issues for cybersecurity professionals. Describe the characteristics and motives of an attacker. 1.4 Cyberwarfare Explain the characteristics and purpose of cyberwarfare. Describe cyberwarfare. Cisco Networking Academy Program Introduction to Cybersecurity v2.0 Chapter 1: The Need for Cybersecurity 5

1.1 Personal Data 1 – The Need for Cybersecurity 1.1 – Personal Data

Personal Data Introduction to Personal Data What is Cybersecurity? Protection of networked system and data from unauthorized use or harm Your Online and Offline Identity Offline Identity Your identity that interacts on a regular basis at home, school or work Online Identity Your identity while you are in cyberspace Should only reveal a limited amount of information about you Username or alias Should not include any personal information Should be appropriate and respectful Should not attract unwanted attention 1.1 – Personal Data 1.1.1 – Introduction to Personal Data 1.1.1.1 – What is Cybersecurity? 1.1.1.2 – Your Online and Offline Identity

Personal Data Introduction to Personal Data Your Data Medical Records electronic health records (EHR) – physical, mental, and other personal information prescriptions Education Records Grades, test scores, courses taken, awards and degrees rewarded Attendance Disciplinary reports Employment and Financial Records Income and expenditures Tax records – paycheck stubs, credit card statements, credit rating and banking statement Past employment and performance 1.1 – Personal Data 1.1.1 – Introduction to Personal Data 1.1.1.3 – Your Data

Personal Data Introduction to Personal Data Where is Your Data? Medical records: doctor’s office, insurance company Store loyalty cards Stores compile your purchases Marketing partner uses the profiles for target advertisement Online pictures: friends, strangers may also have a copy Your Computer Devices Data storage and your portal to your online data List some example of your computing devices 1.1 – Personal Data 1.1.1 – Introduction to Personal Data 1.1.1.4 – Where is Your Data? 1.1.1.5 – Your Computing Devices

Personal Data Personal Data as a Target How do the criminals get your money? Online credentials Gives thieves access to your accounts Creative schemes Trick into wiring money to your friends or family Why do they want your identity? Long-term profits Medical benefits File a fake tax return Open credit card accounts Obtain loans 1.1 – Personal Data 1.1.2 – Personal Data as a Target 1.1.2.1 – They Want Your Money 1.1.2.2 – They Want Your Identity

1.2 Organizational Data 1 – The Need for Cybersecurity

Organizational Data Introduction to Organizational Data Types of Organizational Data Traditional Data Personnel – application materials, payroll, offer letter, employee agreements Intellectual – patents, trademarks, product plans, trade secrets Financial – income statements, balance sheets, cash flow statements Internet of Things and Big Data IoT – large network of physical objects, such as sensors Big Data – data from the IoT Confidentiality, Integrity and Availability Confidentiality – privacy Integrity – accuracy and trustworthiness of the information Availability – information is accessible 1.2 – Organizational Data 1.2.1 – Introduction to Organizational Data 1.2.1.1 – Types of Organizational Data 1.2.1.2 – Confidentiality, Integrity and Availability

Introduction to Organizational Data Lab – Compare Data with a Hash

Organizational Data The Impact of a Security Breach The Consequences of a Security Breach Not feasible to prevent every attack Attackers will always find new ways Ruined reputation, vandalism, theft, revenue lost, damaged intellectual property Security Breach Example - LastPass An online password manager Stolen email addresses, password reminders, and authentication hashes Requires email verification or multi-factor authentication when logging in from an unknown device Users should use complex master password, change master password periodically, and beware of phishing attacks 1.2 – Organizational Data 1.2.2 – The Impact of a Security Breach 1.2.2.1 – The Consequences of a Security Breach 1.2.2.2 – Security Breach Example 1

Organizational Data The Impact of a Security Breach Security Breach Example - Vtech Vtech is a high tech toy maker for children exposed sensitive information including customer names, email addresses, passwords, pictures, and chat logs. Vtech did not safeguard information properly Hackers can create email accounts, apply for credits, and commit crimes using the children’s information Hackers can also take over the parents’ online accounts Security Breach Example - Equifax Equifax is a consumer credit reporting agency. Attackers exploited a vulnerability in web application software. Equifax established a dedicated web site with a new domain name that allowed nefarious parties to create unauthorized websites for phishing scheme 1.2 – Organizational Data 1.2.2 – The Impact of a Security Breach 1.2.2.3 – Security Breach Example 2 1.2.2.4 – Security Breach Example 3

The Impact of a Security Breach Lab – What Was Taken? 1.2 – Organizational Data 1.2.2 – The Impact of a Security Breach 1.2.2.5 – Lab – What Was Taken?

1.3 Attackers and Cybersecurity Professionals 1 – The Need for Cybersecurity 1.3 – Attackers and Cybersecurity Professionals

The Profile of a Cyber Attacker Types of Attackers Amateurs Script kiddies with little or no skill Using existing tools or instructions found online for attacks Hackers - break into computers or networks to gain access White hats – break into system with permission to discover weaknesses so that the security of these systems can be improved Gray hats – compromise systems without permission Black hats - take advantage of any vulnerability for illegal personal, financial or political gain Organized Hackers - organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers. 1.3 – Attackers and Cybersecurity Professionals 1.3.1 – The Profile of a Cyber Attacker 1.3.1.1 – Types of Attackers

The Profile of a Cyber Attacker Internal and External Threats Internal Security Threats Can be an employee or contract partner Mishandle confidential data Threaten the operations of internal servers or network infrastructure devices Facilitate outside attacks by connecting infected USB media into the corporate computer system Accidentally invite malware onto the network through malicious email or websites Can cause great damage because of direct access External Security Threats exploit vulnerabilities in network or computing devices use social engineering to gain access 1.3 – Attackers and Cybersecurity Professionals 1.3.1 – The Profile of a Cyber Attacker 1.3.1.2 - Internal and External Threats

1.4 Cyberwarfare 1 – The Need for Cybersecurity 1.4 - Cyberwarfare

Overview of Cyberwarfare What is Cyberwarfare Conflict using cyberspace Stuxnet malware Designed to damage Iran’s nuclear enrichment plant Used modular coding Used stolen digital certificates 1.4 - Cyberwarfare 1.4.1 – Overview of Cyberwarfare 1.4.1.1 – What is Cyberwarfare?

Overview of Cyberwarfare The Purpose of Cyberwarfare Use to gain advantage over adversaries, nations or competitors Can sabotage the infrastructure of other nations Give the attackers the ability to blackmail governmental personnel Citizens may lose confidence in the government’s ability to protect them. Affect the citizens’ faith in their government without ever physically invading the targeted nation. 1.4 - Cyberwarfare 1.4.1 – Overview of Cyberwarfare 1.4.1.2 – The Purpose of Cyberwarfare

1.5 Chapter Summary 1 – The Need for Cybersecurity 1.5 - Summary

Chapter Summary Summary Define personal data. Explain the characteristics and value of personal data. Explain the characteristics and value of data within an organization. Describe the impact of security breach. Describe the characteristics and motives of an attacker. Describe the legal and ethical issues facing a cybersecurity professional. Explain the characteristics and purpose of cyberwarfare. 1.5.1.1 - Summary